A new attack group known as Gallmaker spied on military and government organizations by employing living-off-the-land tactics.
To secure products that use open source components, organizations must first take stock of how much of this code they are using in their products.
Researchers observed 13 malware attacks targeting iPhone users in India that exploited open source mobile device management (MDM) tools to breach corporate devices.
Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response.
Known vulnerabilities are the weaknesses that are most often exploited, but how can they be managed?
If your goal is active defense, open source options may be particularly useful because these tools can help you demonstrate value and shore up support.
Organizations with established risk management processes can drive efficiency and improve their overall risk posture by leveraging open source tools.
While fraudsters have yet to master adversarial AI, the only way for the security community to get ahead of the emerging threat is through collaborative defense.
Security researchers uncovered two new ransomware strains that use open source tools to minimize their victims' odds of recovering their encrypted files.
Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code
There are many benefits to developing software using open source code, but these components can also introduce vulnerabilities into your code.